NotesFAQContact Us
Collection
Advanced
Search Tips
Source
Education and Information…55
Audience
Media Staff1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 55 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Valdemar Švábenský; Jan Vykopal; Pavel Celeda; Ján Dovjak – Education and Information Technologies, 2024
Computer-supported learning technologies are essential for conducting hands-on cybersecurity training. These technologies create environments that emulate a realistic IT infrastructure for the training. Within the environment, training participants use various software tools to perform offensive or defensive actions. Usage of these tools generates…
Descriptors: Computer Security, Information Security, Training, Feedback (Response)
Peer reviewed Peer reviewed
Direct linkDirect link
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Mohamed Al Hemairy; Manar Abu Talib; Ather Khalil; Ahsan Zulfiqar; Takua Mohamed – Education and Information Technologies, 2024
Academic credentials play an immensely significant role in the career of a person and in the progress of society. The system in place currently used for the issuance, storage & sharing of academic credentials is quite inefficient in its operations, due to being paper based in large. There is also widespread fraud committed every year in terms…
Descriptors: Foreign Countries, Computer Security, Information Security, Credentials
Peer reviewed Peer reviewed
Direct linkDirect link
Essohanam Djeki; Jules Dégila; Muhtar Hanif Alhassan – Education and Information Technologies, 2024
COVID-19 has significantly impacted humankind's lifestyle since its emergence. Educational institutions quickly adopted online courses to deal with its spread. Regrettably, the adoption of e-learning solutions, particularly in Africa, has not given due priority to security. However, cyberattacks and cyber incidents are leaping forward. To propose…
Descriptors: Foreign Countries, COVID-19, Pandemics, Electronic Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Liangqing Li – Education and Information Technologies, 2024
The purpose of the current article is to evaluate social responsibility, digital ethics, and knowledge about safe data storage among students of different ages. Four hundred students took part in the study: 200 people each in the first and fifth years of study. Their ages were 19.2 years (SD = 1.08) and 24.4 years (SD = 1.18), respectively. The…
Descriptors: Information Security, Social Responsibility, Ethics, Knowledge Level
Peer reviewed Peer reviewed
Direct linkDirect link
Catal, Cagatay; Ozcan, Alper; Donmez, Emrah; Kasif, Ahmet – Education and Information Technologies, 2023
Due to the increasing number of cyber incidents and overwhelming skills shortage, it is required to evaluate the knowledge gap between cyber security education and industrial needs. As such, the objective of this study is to identify the knowledge gaps in cyber security graduates who join the cyber security workforce. We designed and performed an…
Descriptors: Computer Security, Information Security, College Programs, Knowledge Level
Peer reviewed Peer reviewed
Direct linkDirect link
Garg, Anuj; A., Sharmila; Kumar, Pramod; Madhukar, Mani; Loyola-González, Octavio; Kumar, Manoj – Education and Information Technologies, 2022
Nowadays, internet technology plays a vital role in all the fields of our daily lives ranging from the world economy, professional careers, higher education, and almost all the spheres that are deeply impacted. In the current situation, due to COVID-19, the dependence on the Internet for almost everything, including learning, getting daily needs,…
Descriptors: Internet, Electronic Learning, Online Courses, Educational Quality
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Hao; Zhang, Yan; Zhang, Song; Lyu, Tu – Education and Information Technologies, 2023
This study examines the effect of a gamified information security education system (ISES) on developing users' information security awareness and protection behavioral intention. We developed a research model based on affordance theory and means-end chain theory. Using a scenario-based experimental survey approach, we obtained 220 valid samples…
Descriptors: Intention, Information Security, Computer Security, Correlation
Peer reviewed Peer reviewed
Direct linkDirect link
Héctor Galindo-Domínguez; María José Bezanilla; Lucía Campo – Education and Information Technologies, 2025
Although part of their use is intended for leisure, social networks could be a useful tool for developing students' critical thinking. Nevertheless, this relationship could also be influenced by our competence in learning to learn, that is to say, our knowledge, skills, and attitudes associated with self-regulation, metacognition, use of learning…
Descriptors: Social Media, College Students, Critical Thinking, Problem Solving
Peer reviewed Peer reviewed
Direct linkDirect link
Švábenský, Valdemar; Vykopal, Jan; Celeda, Pavel; Kraus, Lydia – Education and Information Technologies, 2022
Cybersecurity professionals need hands-on training to prepare for managing the current advanced cyber threats. To practice cybersecurity skills, training participants use numerous software tools in computer-supported interactive learning environments to perform offensive or defensive actions. The interaction involves typing commands, communicating…
Descriptors: Data Use, Learning Analytics, Information Security, Training
Peer reviewed Peer reviewed
Direct linkDirect link
Tyler Poe; Ankur Chattopadhyay – Education and Information Technologies, 2024
Existing research literature in computing and IT education shows that there has been limited work on investigating how offense based learning approaches using hacks can enhance learning of mobile security topics. In an effort to fill this research gap, we performed an experimental study with a unique, nifty user hack driven offense based learning…
Descriptors: Information Security, Computer Security, Telecommunications, Handheld Devices
Peer reviewed Peer reviewed
Direct linkDirect link
Al-Shamli, Malik; Al Hijji, Khalfan Zahran; Shaikh, Abdul Khalique – Education and Information Technologies, 2023
This paper aims at reviewing Information Security Awareness (ISA) practices in general and at Omani Government Agencies (OGA) in particular. It also explores the concerns and challenges that may affect their implementation, and the reasons why ISA practices remained problematic for more than a decade at the OGAs. To inform the aim of this…
Descriptors: Foreign Countries, Information Security, Federal Government, Public Agencies
Peer reviewed Peer reviewed
Direct linkDirect link
Rehman, Shafiq Ul; Manickam, Selvakumar; Al-Charchafchi, Ahmed – Education and Information Technologies, 2023
The increasing daily use of Online Social Networks (OSN) around the world leads to more issues related to user privacy behaviour in this attractive environment. While users can get many benefits by using OSN services, they have many concerns regarding their information privacy at the same time. Despite their privacy concerns, users are still using…
Descriptors: Foreign Countries, Social Media, Privacy, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Haque, Mustafizul; Kumar, V. Vijaya; Singh, Preeti; Goyal, Adheer A.; Upreti, Kamal; Verma, Ankit – Education and Information Technologies, 2023
Now a days with the rapidly increasing development of technology and communication system, the implementation of blockchain is continuously increasing in various sectors. With the increase in massive data in educational sectors there arise a requirement of handling such enormous data. This can be easily and securely handled by blockchain…
Descriptors: Meta Analysis, Information Technology, Technology Uses in Education, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Gümüs, Muhammed Murat; Çakir, Recep; Korkmaz, Özgen – Education and Information Technologies, 2023
Today, with digital technologies being in every aspect of our lives, cyberbullying and digital ethics, and digital security violations are emerging as concepts that threaten our digital world. It is thought that displaying ethical behavior and providing digital security in digital environments can increase sensitivity to cyberbullying. Here, it is…
Descriptors: Preservice Teachers, Bullying, Computer Mediated Communication, Ethics
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4